A maliciously crafted TGA file, when linked or imported into Autodesk 3ds Max, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
                
            References
                    Configurations
                    History
                    19 Aug 2025, 14:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
13 Aug 2025, 15:04
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time | Autodesk Autodesk 3ds Max | |
| CPE | cpe:2.3:a:autodesk:3ds_max:*:*:*:*:*:*:*:* | |
| References | () https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0016 - Vendor Advisory | 
07 Aug 2025, 21:26
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | 
06 Aug 2025, 21:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-08-06 21:15
Updated : 2025-08-19 14:15
NVD link : CVE-2025-6634
Mitre link : CVE-2025-6634
CVE.ORG link : CVE-2025-6634
JSON object : View
Products Affected
                autodesk
- 3ds_max
CWE
                
                    
                        
                        CWE-120
                        
            Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
